Thunderspy allows for evil maid type attacks against a host computer. Evil maid attacks require physical access to the...
DataLocker Blog
Welcome to the DataLocker blog, your home for DataLocker’s thoughts on the trends moving the cybersecurity industry. Bad actors are constantly developing new ways to attack and steal your data – don’t get caught in the dark. Follow the DataLocker blog for the latest in security vulnerabilities and how you can better protect your remote data.Remote Worker Software Toolkit from DataLocker – Stay Productive and Compliant
As many companies move to a remote teleworking environment there is increased concern about how to keep sensitive data at...
The Laptop Alternative, the Thumbtop – Managed Secure USBs with Managed Apps
What if your “laptop” only weighed 9 grams, never broke down, and took 3 minutes to issue out? DataLocker’s managed,...
The Sentry K300 Micro SSD
The next generation of security and convenience is here—and it’scalled the Sentry K300! This micro SSD offers not just...
Thanking Our Customers and Showing Our Appreciation
DataLocker is honored to provide exceptional products and services for our customers all year long, but there is no better...
Top Benefits of Encrypted External Hard Drives
Storing and transferring data is getting easier and easier. And while that can mean time savings and convenience for your...
How to Prevent a Security Breach
Security breaches can be a big problem: for your customers, for your investors, for your business. And as more and more...
Endpoint Management
Gone are the days when an organization’s data was accessed strictly on-site. The convenience of laptops, tablets,...
Importance of Secure Data
Your data deserves secure storage—and you deserve the confidence that comes with knowing your most important information is...